Build gen AI apps with an all-in-one modern database: MongoDB Atlas
MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
Start Free
Keep company data safe with Chrome Enterprise
Protect your business with AI policies and data loss prevention in the browser
Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
DEAL (Domain Extraction ALgorithm) is an application for domain analysis. Its main purpose is to extract domain information from existing Java applications and to create different kinds of models from the extracted data, including domain-specific languages.
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
A rather simple java program for parsing plain text files (generally in large numbers), which should then offer frequency statistics of usage, graphs, full-text search and maybe something more.
This toolkit facilitates easier connections between stored data, intermediate data, and data presented to users in Java applications. The classes are abstracted as much as possible to allow wide use for various types of programs.
Alpie implements lp2 [(LP)2, Fabio Ciravegna Univ. of Sheffield] and an extended version of it. The methods in this package can be used to test and verify grammars for different corporas.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Yet another MAZE!
There is going to be maze generation algorithm(s) and pathfinders who use certain algorithms to solve the maze.
This project was initially a student team project at Thompson Rivers University(TRU) to demonstrate search algorithms.
JNeuron is an analysis tool for multi-neuronal spike train analysis. The tool will allow scientists to organize their spike train data analysis into projects. The tool will implement standard spike train analysis algorithms and also datamining algorithms
A general purpose CPU scavenging platform written in Java. The goal of the Numenor project is to provide a distributed processing platform that allows an organization to take advantage of unused CPU capacity.
it provides a user interface to the economic theory through an intuitive and easily understandable quantification of the economic value of alternative business models.
An Expert Search System for Enterprise Search based on the Information Retrieval Vector Space Model. Our model builds a weighted profile for each candidate and keeps all the documents, thus allowing to retrieve both people and documents together.
S.o.n.a.r. is an analysis- and visualization tool developed for the popular business network XING (www.xing.com).
Registered XING users can search for companies and contact their personnel manager or other decision makers, i.e. for a job application.
RunAsApproximator es un programa java multilenguaje que implementa algoritmos numéricos. Los datos de entrada son aquellos requeridos por cada algoritmo y los de salida son resultado final y los datos intermedios necesarios para alcanzar su resolución.
KF Checker is a tool for analysing Information Flow properties.
KF Checker infers information flow rules from source code.
The rules obtained in this way are used to create a theory which it then exploited to prove that information flow policies are respected.